);\r
ASSERT_EFI_ERROR (Status);\r
\r
- //\r
- // Transfer control to the DXE Core\r
- // The handoff state is simply a pointer to the HOB list\r
- //\r
-\r
- Status = PeiServicesInstallPpi (&mPpiSignal);\r
- ASSERT_EFI_ERROR (Status);\r
-\r
//\r
// Add HOB for the DXE Core\r
//\r
);\r
}\r
\r
+ //\r
+ // Transfer control to the DXE Core\r
+ // The handoff state is simply a pointer to the HOB list\r
+ //\r
+\r
DEBUG ((EFI_D_INFO, "DXE Core Entry Point 0x%08x\n", (UINTN) DxeCoreEntryPoint));\r
- HandOffToDxeCore (DxeCoreEntryPoint, HobList);\r
+ HandOffToDxeCore (DxeCoreEntryPoint, HobList, &mPpiSignal);\r
//\r
// If we get here, then the DXE Core returned. This is an error\r
// Dxe Core should not return.\r
{\r
EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader;\r
EFI_FFS_FILE_HEADER *FfsFileHeader;\r
- VOID *SectionData;\r
EFI_STATUS Status;\r
EFI_PEI_HOB_POINTERS Hob;\r
\r
\r
FwVolHeader = NULL;\r
FfsFileHeader = NULL;\r
- SectionData = NULL;\r
Status = EFI_SUCCESS;\r
\r
//\r
UINTN SectionLength;\r
UINTN OccupiedSectionLength;\r
UINT64 FileSize;\r
- EFI_GUID_DEFINED_SECTION *GuidedSectionHeader;\r
UINT32 AuthenticationStatus;\r
EFI_PEI_SECTION_EXTRACTION_PPI *SectionExtract;\r
UINT32 BufferSize;\r
// Was the DXE Core file encapsulated in a GUID'd section?\r
//\r
if (Section->Type == EFI_SECTION_GUID_DEFINED) {\r
- //\r
- // Locate the GUID'd Section Extractor\r
- //\r
- GuidedSectionHeader = (VOID *) (Section + 1);\r
\r
//\r
// This following code constitutes the addition of the security model\r
//\r
// GetInfo failed\r
//\r
+ DEBUG ((EFI_D_ERROR, "Decompress GetInfo Failed - %r\n", Status));\r
return EFI_NOT_FOUND;\r
}\r
\r
DstBuffer,\r
ScratchBuffer\r
);\r
+ if (EFI_ERROR (Status)) {\r
+ //\r
+ // Decompress failed\r
+ //\r
+ DEBUG ((EFI_D_ERROR, "Decompress Failed - %r\n", Status));\r
+ return EFI_NOT_FOUND;\r
+ }\r
}\r
\r
CmpSection = (EFI_COMMON_SECTION_HEADER *) DstBuffer;\r